IOT Presentation
IOT Presentation
1
Introduction
INTERNET
OF
THINGS
2
Introduction
The Internet of Things (IoT) refers to the interconnectivity of
physical devices, vehicles, home appliances, and other items
4
Interoperability
Interoperability refers to the ability of different systems, devices, or components
to work together seamlessly and exchange data effectively.
In the context of the Internet of Things (IoT), interoperability is a critical challenge,
as a large number of diverse devices are being connected to the internet. The lack
of standardization in the IoT can lead to difficulties in communication and data
exchange between devices, resulting in an fragmented and inefficient system.
To overcome this challenge, establishment of standards and protocols
interoperability between IoT devices.
Development of common communication protocols, data formats, and security
standards.
Interoperability is important for enabling the full potential of the IoT and allowing
connected devices to work together effectively and efficiently. Ensuring that
different IoT devices can work together seamlessly and exchange data effectively.
5
Security
Protection of sensitive data and systems from unauthorized access, theft, or
damage.
IoT devices are often vulnerable to cyber attacks due to their increased exposure
to the internet and their limited computing resources.
Some of the security challenges in IoT include:
Device security: Ensuring that IoT devices are protected from malware and
unauthorized access.
Network security: Protecting the communication between IoT devices and the
network from cyber attacks.
Data security: Securing the data collected and transmitted by IoT devices from
unauthorized access or tampering.
Privacy: Protecting the privacy of individuals whose personal information is
collected and transmitted by IoT devices.
To address these security challenges, organizations should implement robust
security measures such as encryption, firewalls, and regular software updates.
They should conduct regular security audits and assessments to identify and 6
address potential security risks. By prioritizing security, organizations
Security Challenges in IoT
Lack of encryption
Insufficient testing and updating
The risk of default passwords
IoT malware and ransomeware
IoT Botnet and aiming at cryptocurrency
Inadequate device security
Lack of standerdisation
Network attacks
Unsecured data transmission
Privacy concerns
Software vulnerabilities
Insider Threats 7
Power consumption
Power consumption refers to the amount of energy that a system or
device uses. In the context of the Internet of Things (IoT)
Battery life: Ensuring that IoT devices have sufficient battery life to
operate without frequent recharging or replacement.
Energy efficiency: Making sure that IoT devices are designed to use
energy efficiently and reduce the overall power consumption of the
system.
Power management:
Effective power management techniques, such as sleep modes, to reduce
the power consumption of IoT devices when they are not in use reducing
costs and environmental impact. Minimizing the power consumption of
IoT devices to extend battery life and reduce costs.
8
Privacy
Privacy is a critical concern in the Internet of Things (IoT), as IoT
devices collect, store, and transmit large amounts of personal and
sensitive information. Some of the privacy challenges in IoT
include:
Data collection: Ensuring that only the necessary data is collected
and that it is collected in a way that respects individuals’ privacy
rights.
Data storage: Ensuring that the data collected by IoT devices is
stored securely and that access to it is strictly controlled.
Data sharing: Controlling who has access to the data collected by
IoT devices and ensuring that it is not shared without proper
authorization.
9
Increased cost and time to market
Embedded systems are lightly constrained by cost.
The need originates to drive better approaches when
designing the IoT devices in order to handle the cost
modelling or cost optimally with digital electronic
components.
Designers also need to solve the design time problem
and bring the embedded device at the right time to the
market.
10
Security of the system
Systems have to be designed and implemented to be robust and
reliable and have to be secure with cryptographic algorithms and
security procedures.
It involves different approaches to secure all the components of
embedded systems from prototype to deployment.
Designers and engineers must carefully balance these design
challenges to create IoT systems that are functional, secure, and
scalable.
11
Deployment challenges in IoT
Connectivity –
Connected devices that provide useful front and information are
extremely valuable.
Poor connectivity becomes a challenge where IoT sensors are
required to monitor process data and supply information.
Cross platform capability –
IoT applications must be developed, keeping in mind the
technological changes of the future.
It is a challenge for IoT application developers to ensure that the
device and IoT platform drivers the best performance despite
heavy device rates and fixings.
Data collection and processing –
In IoT development, data plays an important role. Along with
security and privacy, development teams need to ensure that they 12
plan well for the way data is collected, stored or processed within
an environment.
Deployment challenges in IoT
Lack of skill set –
The right talent will always get you past the major challenges and will be
an important IoT application development asset.
Integration: Ensuring that IoT devices and systems integrate seamlessly
with existing technology and infrastructure.
Network infrastructure: Building and maintaining the network
infrastructure needed to support the large number of connected IoT
devices.
Device management: Efficiently managing and maintaining the large
number of IoT devices in a deployment.
Data management: Managing and analyzing the large amounts of data
generated by IoT devices, and integrating it with existing data systems.
Security: Ensuring that the IoT deployment is secure from threats such as
cyber attacks, data breaches, and unauthorized access. 13
Cost: Balancing the cost of deploying and maintaining an IoT system with
the benefits it delivers.
Sensor Selection
Choosing a sensor (for example, a temperature sensor) for an IOT
application may seem like a straightforward decision. However,
selecting the right sensor involves taking many factors into account:
Cost
Supplier: How trustworthy is this seller? (Look at reviews from
other buyers)
Accuracy & Precision
Availability: Some components can only be in large quantities.
Measurement Range: What ranges will it work for?
Power Consumption: Will it work with the power source I have?
Sensor Selection
Example: Temperature Sensor
15
IoT Development boards
• IoT development boards enable makers to prototype their ideas. They
combine microcontrollers and processors with wireless chips and other components
in a pre‐ built, ready‐to‐program package.
• In the last few years exploded with the availability of a variety of boards.
Whatever the needs of your project or product, there's sure to be a board that
fits your exact requirements.
• New developers can find it difficult to select the right IoT prototyping board.
16
IoT Development boards ‐ Selection
• Cost
• Programming support/options
• Reliability of supplier.
17
1. Arduino Uno
• Arduino Uno remains the top favorite of absolute beginners
and experts.
• The board layout has become almost the gold standard for
microcontrollers. Almost every prototyping environment
tries to be compatible with the Arduino pin breakout.
21
4. Udoo Neo
• Udoo Neo is a full‐blown computer that also has an
Arduino‐compatible microcontroller.
22
5. Particle Photon
• Photon is one of the smallest prototyping boards
available in the market. Powered by the STM32F205
120Mhz ARM Cortex M3 processor, Photon has 1MB
flash, 128KB RAM and a built‐in WIFI module.
• The board comes with five analog pins and eight digital
pins for connecting various sensors and actuators.
As from $2 14
Student Projects implemented at UoM
• Smart Power Monitor
25
Student Projects implemented at UoM
• Smart Rainwater Harvesting System
26
27